miguelquebrado Let’s connect

Graph-Based Malware Detection Using Machine Learning

Master's Thesis — Boise State University

Overview

My master's thesis explores how graph representations of program behavior can detect malware patterns that traditional signature-based approaches miss. By modeling system activity as graphs and extracting structural features, machine learning models can classify malicious vs benign behavior.

Key Techniques Used

  • Graph-based behavioral modeling
  • Feature extraction from graph topology
  • XGBoost classification
  • Python data pipelines
  • Behavioral malware analysis

Architecture Concept

Program Execution
Behavioral Graph Construction
Feature Extraction
Machine Learning Model
Malware Classification

Results

Graph structural relationships between behaviors provided signals that improved detection performance compared to traditional feature approaches. The research demonstrated that modeling program behavior as interconnected graphs captures patterns that flat feature vectors miss.

How This Research Influences My Engineering

This research continues to influence how I think about system design and data modeling. I often approach complex systems as networks of relationships, which helps when designing scalable backend services, analytics pipelines, and machine learning systems. The graph-based thinking translates directly to architecting distributed systems, understanding data dependencies, and optimizing performance bottlenecks.

Thesis Document

Open in new tab →